Title :
Scheduling with privacy constraints
Author :
Kadloor, S. ; Kiyavash, Negar ; Venkitasubramaniam, Parv
Author_Institution :
ECE Dept., UIUC, Urbana, IL, USA
Abstract :
In multi-tasking systems where a finite resource is to be shared, a scheduler dictates how the resource is divided among competing processes. Examples of systems which have schedulers include, a computer where the CPU needs to be shared between the different threads running, a cloud computing infrastructure with shared computing resources, a network router serving packets from different streams etc. In such situations, when a processor is shared by multiple users, the delays experienced by jobs from one user are a function of the arrival pattern of jobs from other users, and the scheduling policy of the server. Consequently, a scheduling system creates a timing side channel in which information about arrival pattern from one user is inadvertently leaked to another. In this work, this information leakage is studied for a two user scheduling system. We first introduce a measure of privacy and then demonstrate that no scheduler can provide maximum privacy without idling/taking vacations, and consequently no policy can simultaneously be delay and privacy optimal.
Keywords :
cloud computing; data privacy; scheduling; cloud computing infrastructure; finite resource; multitasking systems; network router serving packets; privacy constraints; scheduling system; shared computing resources; Delay; Estimation error; Privacy; Throughput; Time division multiple access; Scheduling policy; information leakage; timing side channels;
Conference_Titel :
Information Theory Workshop (ITW), 2012 IEEE
Conference_Location :
Lausanne
Print_ISBN :
978-1-4673-0224-1
Electronic_ISBN :
978-1-4673-0222-7
DOI :
10.1109/ITW.2012.6404704